Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by Arjun
3
votes
3
answers
1201
NIELIT 2018-31
Identify the subnet mask for the given direct broadcast address of subnet is $201.15.16.31$ $255.255.192.192$ $255.255.255.198$ $255.255.255.240$ $255.255.257.240$
Identify the subnet mask for the given direct broadcast address of subnet is $201.15.16.31$$255.255.192.192$$255.255.255.198$$255.255.255.240$$255.255.257.240$
2.4k
views
asked
Dec 7, 2018
Computer Networks
nielit-2018
computer-networks
subnetting
+
–
1
votes
3
answers
1202
NIELIT 2018-32
The context free grammar $S \rightarrow aSb \mid bSa \mid \epsilon$ generates: Equal number of a’s and b’s Unequal number of a’s and b’s Any number of a’s followed by any number of b’s Any number of b’s followed by any number of a’s
The context free grammar $S \rightarrow aSb \mid bSa \mid \epsilon$ generates:Equal number of a’s and b’sUnequal number of a’s and b’sAny number of a’s followed...
2.1k
views
asked
Dec 7, 2018
Compiler Design
nielit-2018
compiler-design
context-free-grammar
+
–
1
votes
3
answers
1203
NIELIT 2018-33
The language $\{ W^a X^b Y^{a+b} \mid a, b, >1\}$ is Regular Context-free but not regular Context sensitive but not context free Type$=0$ but not context sensitive
The language $\{ W^a X^b Y^{a+b} \mid a, b, >1\}$ isRegularContext-free but not regularContext sensitive but not context freeType$=0$ but not context sensitive
1.2k
views
asked
Dec 7, 2018
Compiler Design
nielit-2018
compiler-design
context-free-language
+
–
1
votes
2
answers
1204
NIELIT 2018-34
Identify the true statement from the given statements: Number of child pointers in a B/B+ tree node is always equal to number of keys in it plus one B/B+ tree is defined by a term minimum degree. And minimum degree depends on hard disk block size, key and address size (1) (1) and (2) (2) None of these
Identify the true statement from the given statements:Number of child pointers in a B/B+ tree node is always equal to number of keys in it plus oneB/B+ tree is defined by...
2.0k
views
asked
Dec 7, 2018
Databases
nielit-2018
databases
btrees
+
–
0
votes
2
answers
1205
NIELIT 2018-35
Baud rate measures the number of ____ transmitted per second Symbols Bits Byte None of these
Baud rate measures the number of ____ transmitted per secondSymbolsBitsByteNone of these
2.7k
views
asked
Dec 7, 2018
Others
nielit-2018
+
–
2
votes
3
answers
1206
NIELIT 2018-36
______ is NOT a part of the ACID properties Inconsistency Consistency Atomicity Isolation
______ is NOT a part of the ACID propertiesInconsistencyConsistencyAtomicityIsolation
970
views
asked
Dec 7, 2018
Databases
nielit-2018
databases
transactions-and-concurrency-control
+
–
1
votes
3
answers
1207
NIELIT 2018-37
The smallest element that can be found in time ____ in a binary max heap. $O(n \log n)$ $O( \log n)$ $O(n)$ $O(n^2)$
The smallest element that can be found in time ____ in a binary max heap.$O(n \log n)$$O( \log n)$$O(n)$$O(n^2)$
1.3k
views
asked
Dec 7, 2018
DS
nielit-2018
data-structures
binary-heap
+
–
0
votes
1
answer
1208
NIELIT 2018-38
Find the effective access time for the memory for the given data. Page fault service time $=8$ ms Average memory access time $=20$ ns One page fault is generated for every memory access $=10^6$ $29$ ns $33$ ns $28$ ns $30$ ns
Find the effective access time for the memory for the given data.Page fault service time $=8$ msAverage memory access time $=20$ nsOne page fault is generated for every m...
2.1k
views
asked
Dec 7, 2018
Operating System
nielit-2018
operating-system
memory-management
+
–
1
votes
3
answers
1209
NIELIT 2018-39
A RAM chip has a capacity of $1024$ words of $8$ bits each $(1K \times 8)$. The number of $2 \times 4$ decoders with enable line needed to construct a $32 K \times 8$ RAM from $1K \times 8$ RAM is $4$ $5$ $6$ $7$
A RAM chip has a capacity of $1024$ words of $8$ bits each $(1K \times 8)$. The number of $2 \times 4$ decoders with enable line needed to construct a $32 K \times 8$ RAM...
2.7k
views
asked
Dec 7, 2018
Digital Logic
nielit-2018
digital-logic
combinational-circuit
decoder
+
–
0
votes
3
answers
1210
NIELIT 2018-40
Consider the following Finite State Automaton. The language accepted by the automaton is given by the regular expression. $ab^*b^*$ $a^*b^*$ $b^*b$ $b^*ab^*$
Consider the following Finite State Automaton. The language accepted by the automaton is given by the regular expression.$ab^*b^*$$a^*b^*$$b^*b$$b^*ab^*$
954
views
asked
Dec 7, 2018
Theory of Computation
nielit-2018
theory-of-computation
finite-automata
+
–
1
votes
1
answer
1211
NIELIT 2018-41
____ is used to convert from recursive to iterative implementation of an algorithm Array Tree Stack Queue
____ is used to convert from recursive to iterative implementation of an algorithmArrayTreeStackQueue
3.0k
views
asked
Dec 7, 2018
Programming in C
nielit-2018
data-structures
+
–
1
votes
2
answers
1212
NIELIT 2018-42
____ symbol is used to denote derived attributes in ER model Dashed ellipse Squared ellipse Ellipse with attribute name underlined Rectangular Box
____ symbol is used to denote derived attributes in ER modelDashed ellipseSquared ellipseEllipse with attribute name underlinedRectangular Box
1.4k
views
asked
Dec 7, 2018
Databases
nielit-2018
databases
relational-model
+
–
0
votes
1
answer
1213
NIELIT 2018-43
Which of the following languages over the alphabet $[0,1]$ is described by the given regular expression: $(0+1)^*1(0+1)^*1$? The set of all strings containing the substring $11$ The set of all strings containing at most two $1$’s The set of all strings containing at least two $1$’s The set of all strings that begins and ends with only $0$
Which of the following languages over the alphabet $[0,1]$ is described by the given regular expression: $(0+1)^*1(0+1)^*1$?The set of all strings containing the substrin...
3.6k
views
asked
Dec 7, 2018
Theory of Computation
nielit-2018
theory-of-computation
regular-expression
+
–
1
votes
3
answers
1214
NIELIT 2018-44
Time to Live(TTL) field in the IP datagram is used ______ to optimize throughput to prevent packet looping to reduce delays to prioritize packets
Time to Live(TTL) field in the IP datagram is used ______to optimize throughputto prevent packet loopingto reduce delaysto prioritize packets
1.9k
views
asked
Dec 7, 2018
Computer Networks
nielit-2018
computer-networks
ttl
+
–
2
votes
3
answers
1215
NIELIT 2018-45
______ transport layer protocol is used to support electronic mail SNMP IP SMTP TCP
______ transport layer protocol is used to support electronic mailSNMPIPSMTPTCP
2.2k
views
asked
Dec 7, 2018
Computer Networks
nielit-2018
computer-networks
transport-layer
+
–
1
votes
1
answer
1216
NIELIT 2018-46
The hexadecimal representation of $(632)_8$ is $19A$ $198$ $29A$ $291$
The hexadecimal representation of $(632)_8$ is$19A$$198$$29A$$291$
1.4k
views
asked
Dec 7, 2018
Digital Logic
nielit-2018
digital-logic
number-representation
+
–
1
votes
1
answer
1217
NIELIT 2018-47
______ sorting algorithms has the lowest worst-case complexity. Selection Sort Bubble Sort Merge Sort Quick Sort
______ sorting algorithms has the lowest worst-case complexity.Selection SortBubble SortMerge SortQuick Sort
17.0k
views
asked
Dec 7, 2018
Algorithms
nielit-2018
algorithms
sorting
+
–
0
votes
2
answers
1218
NIELIT 2018-48
Decreasing the RAM causes fewer page faults more page faults virtual memory gets increased virtual memory gets decreased
Decreasing the RAM causesfewer page faultsmore page faultsvirtual memory gets increasedvirtual memory gets decreased
3.4k
views
asked
Dec 7, 2018
Operating System
nielit-2018
operating-system
virtual-memory
+
–
5
votes
3
answers
1219
NIELIT 2018-49
The following table has two attributes $X$ and $Y$ where $X$ is the primary key and $Y$ is the foreign key referencing $X$ ... $(4,3)$ and $(6,4)$ $(2,4)$ and $(7,2)$ $(3,2)$ and $(9,5)$ $(3,4), (4,5)$ and $(6,4)$
The following table has two attributes $X$ and $Y$ where $X$ is the primary key and $Y$ is the foreign key referencing $X$ with on-delete cascade.$\begin{array}{|c|c|} \h...
3.7k
views
asked
Dec 7, 2018
Databases
nielit-2018
databases
referential-integrity
+
–
0
votes
1
answer
1220
NIELIT 2018-50
The process executes the following code and after execution ______ number of child process get created fork(); fork(); fork(); fork(); $4$ $1$ $15$ $16$
The process executes the following code and after execution ______ number of child process get createdfork(); fork(); fork(); fork();$4$$1$$15$$16$
2.6k
views
asked
Dec 7, 2018
Operating System
nielit-2018
operating-system
+
–
Page:
« prev
1
...
56
57
58
59
60
61
62
63
64
65
66
...
96
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register